Science of Cyber Security
4th International Conference, SciSec 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers
Chapter and Conference Paper
The authors have previously confirmed that the flow of OAuth, a traditional authorization method on the Internet, can be managed appropriately by applying it to allocating computational resources in edge compu...
Chapter and Conference Paper
Adversarial attacks pose a significant threat to the reliability and security of deep learning models, particularly in image processing applications. Defending against these sophisticated manipulations require...
Chapter and Conference Paper
Consumers use various payment methods to purchase goods and services from retailers, such as cash, credit cards, debit cards, prepaid cards, and barcodes/two-dimensional codes. In the past, in the case of in-s...
Chapter and Conference Paper
The DDoS attack remains one of the leading attacks today. To reduce the number of resource-consuming detection algorithm calls, the trigger-based two-stage detection approach has been proposed. In such systems...
Chapter and Conference Paper
Recently, as big data and AI technology advance, data privacy and security are increasingly critical. Federated Learning (FL) has become a key solution in machine learning to address these concerns. In this pa...
Article
Recently, an increasing number of laws have governed the useability of users’ privacy. For example, Article 17 of the General Data Protection Regulation (GDPR), the right to be forgotten, requires machine learnin...
Chapter and Conference Paper
Federated Learning (FL) and the Internet of Things (IoT) have transformed data processing and analysis, overcoming traditional cloud computing limitations. However, challenges such as catastrophic forgetting i...
Chapter and Conference Paper
Passwords are playing a major role for authentication in our daily life. However contemporary passwords are typically either difficult to remember or vulnerable to various attacks. In 2017, Blocki, Blum, Datta...
Chapter and Conference Paper
Over the past decade, the development of both adversarial attack methods and defense strategies has accelerated rapidly. Classification accuracy has been predominantly used as the sole metric for assessing mod...
Chapter and Conference Paper
Temporal Convolution Network(TCN) has recently been introduced in the cybersecurity field, where two types of TCNs that consider causal relationships are used: causal TCN and non-causal TCN. Previous researche...
Chapter and Conference Paper
This paper delivers a post-quantum construction for group-oriented attribute-based encryption (GO-ABE) using lattice-based cryptography. The GO-ABE scheme enables users from the same group to combine their att...
Chapter and Conference Paper
Non-malleable codes are introduced to protect the communication against adversarial tampering of data, as a relaxation of the error-correcting codes and error-detecting codes. To explicitly construct non-malle...
Chapter and Conference Paper
Convolutional neural networks are widely used for image recognition tasks, but they are vulnerable to adversarial attacks that can cause the model to misclassify an image. Such attacks pose a significant secur...
Chapter and Conference Paper
In a symmetric key encryption the sender and the receiver must possess the same pre-distributed key in order to encrypt or decrypt the exchanged messages. Exchanging symmetric keys is a challenging issue in cr...
Chapter and Conference Paper
Secure key exchange is an important step to secure a communication. When multiple parties are using a symmetric key encryption protocol, they need a secret key to exchange encrypted messages. If the key is com...
Chapter and Conference Paper
Sharing microdata is a very important part of the present day world, but when they contain sensitive information, privacy to individuals needs to be guaranteed before release of data. One idea is to study the ...
Chapter and Conference Paper
This paper proposes a group signature scheme with a tracing mechanism that limits the tracing ability of tracers based on their attributes and decentralizes the tracing key generation method. Thus, no other pa...
Chapter and Conference Paper
Machine learning is one of the predominant methods used in computer science and has been widely and successfully applied in many areas such as computer vision, pattern recognition, natural language processing,...
Book and Conference Proceedings
4th International Conference, SciSec 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers
Book and Conference Proceedings
AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers